InvestorsHub Logo
Followers 1
Posts 578
Boards Moderated 0
Alias Born 09/08/2016

Re: None

Wednesday, 10/19/2016 9:30:20 AM

Wednesday, October 19, 2016 9:30:20 AM

Post# of 235125
comparing this intel video to the patent that strike force owns. Is it the same?

http://www.intel.com/content/www/us/en/architecture-and-technology/authenticate/enhanced-identity-theft-protection-animation.html

also referred to as the centralized out-of-band authentication system (COBAS). COBAS 340 proceeds with authenticating the user through the user's cellular telephone over an authentication channel. The security system 340 calls the access-seeking user at the cellular telephone 326. The user answers the phone and is prompted to enter a password for password verification and to enter a biometric identifier, such as a fingerprint. The security system 340 authenticates the user and sends the result to the web server 334. Upon a positive authentication and after disconnecting from the authentication channel, access is granted along the access channel to the USER'S PC device 322.

The flow diagram for the COBAS device 340 software is analogous to that described in the first embodiment, supra, but for the speech module 66. In lieu thereof, in FIG. 12 the fingerprint module 366 architecture is detailed. The fingerprint verification hardware 384, consists of digital signal processors that utilize algorithms for verification of an accessor's fingerprint. The fingerprint verification hardware 384 is controlled by the software program of the fingerprint hardware driver 386. The software program of the fingerprint verification processing unit 388 provides an interface with control module 362 and is structured to respond to queries therefrom for verifying an accessor's password. Also, the fingerprint processing unit 388 enables the enrollment of users fingerprint and the interaction of the fingerprint database of the COBAS device 340.

https://patentimages.storage.googleapis.com/US7870599B2/US07870599-20110111-D00017.png